International Workshop on Secure Wireless Communication Systems: Infrastructure, Algorithms, and Management

Scope

In recent decades, wireless communication has made a remarkable impact on a diverse range of fields. Research labs, financial markets, media, and weather forecasting have all adopted high-performance computing to accomplish parallel processing, live streaming, reliable information technology, and predictive analytics. In some computationally intensive applications, such as meteorology or deep neural network training, fast network interface cards (NICs) are used to boost network performance and data-path speed. More specifically, in many Internet of Things (IoT) applications, bio-inspired communication approaches are used for self-organizing and self-configuration to drive the network without disruption. In large-scale networks, present wireless communication employs key enabling technologies like massive multiple-input and multiple-output (MIMO), millimeter-wave spectrum, network ultra-densification, and scalable IoT to perform duplex communications, high bandwidth allocation, seamless coverage, and network slicing.

Although it has a variety of advantages in diversified data-driven fields, wireless communication is vulnerable to ransomware, wireless network sniffing, others gaining control of the router, rogue access points, wireless zero-configuration, and wireless hijacking by cybercriminals and eavesdroppers across the network. To enhance the security of such data-driven networks, several natural and bio-inspired algorithms have been modeled to perform secure, high-performance computing in computationally intensive applications. For instance, swarm intelligence for wireless communication is a bio-inspired approach that consists of a comprehensive set of machine learning algorithms used to classify the optimal parameters, which in turn detect cyber-attacks in wireless networks. Honeybee-based bio-inspired algorithms with foraging methods are widely used for their self-organizing features in distributed networks to detect and alleviate attacks in a system. Bio-inspired epidemic algorithms have been designed to detect malicious behavior in communication paths by camouflaging adversary activities through transmissive attacks, and in military communications, algorithms based on bio-inspired radio frequency (RF) steganography have been modeled to prevent eavesdroppers from hearing information by communicating through encrypted chirp radar signals. Thus, nature and bio-inspired algorithms are beneficial in enhancing security and network performance in high-performance distributed computing environments. The aim of this Special Issue is to bring together original research and review articles discussing the security threats and challenges in future mobile communication systems.

Submit paper

Topics

Potential topics include but are not limited to the following:

• Protocols for access control, authentication, and authorization in wireless communication systems;
• Abnormity detection and control protocols for mobility in wireless communication systems;
• AI-based protocols to resist compulsive attacks in wireless communication systems;
• Deep learning integrated identification and authentication protocols for wireless communication systems;
• Secure data acquisition and mining for user demand cells in wireless communication systems;
• Security in edge and fog computations in wireless communication systems;
• Network and transport layer security for 5G and beyond cellular communication;
• Machine learning (ML) integrated end-to-end security protocol for wireless communication systems;
• Security framework for mobile E-services in wireless communication systems;
• Blockchain-based authentication of information transmission for cooperative mobile users;
• Secure cloud-based mobile computation in future mobile communication;
• Key enabling technologies for secure wireless communication;
• Privacy, safety, and cyberattacks in wireless communication;
• Security challenges and mitigation approaches in high performance distributed computing environments;
• Cyberattack detection and prevention systems for computationally intensive applications;
• Parallel and distributed computing techniques for secure wireless communication.

Guest Editors

Dr. Ahmed Farouk, Ph.D., MIET, SMIEEE.
Lindau Nobel Laureate Alumni
Outstanding IEEE Computer Chapter for K-W Region 2020
Faculty of Science, Department of Physics and Computer Science Wilfrid Laurier University, Waterloo, Canada
School of Information Technology Management Ryerson University, Toronto, Canada.
Chair- IEEE Computer Chapter, C16 (Waterloo-Kitchener)
Editorial Board Member for Scientific Reports (Nature, 2019-2021)
Associate Editor Member for IEEE Access (IEEE, 2019-2022)
Associate Editor Member for IET (IET, 2019-2021)
Associate Editor Member for Mathematical Modelling of Engineering Problems (IIETA)
Editorial Board Member for Cryptography (MDPI, 2019-2022)
Associate Editor for IEEE Canadian Review (ICR)


Prof. Shahid Mumtaz, FIET, SMIEEE, CEng. (Professor)

Senior Research Scientist, Mobile Communication Group, Instituto de Telecomunicações, Aveiro, Portugal.
Adjunct Senior Lecturer, University of Essex, UK.
Adjunct Associate Professor, Electrical & Electronic Engineering Department, COMSATS Lahore, Pakistan.
Senior 5G Expert Consultant, Huawei, Sweden.
Professor, School of Computer Sciences, Telecommunication & Transport Institute (TSI), Riga, Latvia.
IEEE ComSoc Distinguished Lecturer
IEEE IAS Distinguished Lecturer
ACM Distinguished Speaker

Publication

All registered papers will be submitted for publishing by Springer and made available through SpringerLink Digital Library.

Proceedings will be submitted for inclusion in leading indexing services, such as Web of Science, EI Engineering Index (Compendex and Inspec databases), DBLP, EU Digital Library, Google Scholar, IO-Port, MathSciNet, Scopus, Zentralblatt MATH.

Authors of selected papers will be invited to submit an extended version to:

All accepted authors are eligible to submit an extended version in a fast track of:

Additional publication opportunities:

Paper submission

Papers should be submitted through EAI ‘Confy+‘ system, and have to comply with the Springer format (see Author’s kit section).

All conference papers undergo a thorough peer review process prior to the final decision and publication. This process is facilitated by experts in the Technical Program Committee during a dedicated conference period. Standard peer review is enhanced by EAI Community Review which allows EAI members to bid to review specific papers. All review assignments are ultimately decided by the responsible Technical Program Committee Members while the Technical Program Committee Chair is responsible for the final acceptance selection. You can learn more about Community Review here.

Important dates

Full Paper Submission deadline
15 October 2021
Notification deadline
29 October 2021
Camera-ready deadline
19 November 2021